Automatic Graph-Based Clustering for Security Logs.
Hudan StudiawanChristian PayneFerdous SohelPublished in: AINA (2019)
Keyphrases
- clustering algorithm
- graph theoretic
- k means
- clustering method
- data clustering
- information security
- access control
- fully automatic
- cluster analysis
- graph model
- security requirements
- intrusion detection
- self organizing maps
- information theoretic
- fuzzy clustering
- network security
- security policies
- information systems
- information assurance
- data sets
- security threats
- security problems
- security issues
- log data
- hierarchical clustering
- data objects